Analysis
-
max time kernel
100s -
max time network
140s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
31-12-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
ROBLOX Cheat.zip
Resource
win10v2004-20241007-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
ROBLOX Cheat.zip
Resource
win10ltsc2021-20241211-en
2 signatures
150 seconds
General
-
Target
ROBLOX Cheat.zip
-
Size
21.3MB
-
MD5
f292a7b52c861a26b1ba1611499bddde
-
SHA1
f6398a6ab23d51dd5b1eac2f72a49990306e1f99
-
SHA256
403eca5a2ba82d0195197853d896c2bd1b13297fc4fe9e8ffd732b6fab3fdef4
-
SHA512
e9acb37910af2b5be7c07be32977316dd318a242e30927914d1477bb4b347bc02fb9b83c283a5f3ffb3dea8c85b9092d55a6eab8e14c58abf74c55730a501b34
-
SSDEEP
393216:COCMj1RUE3bUXOb5xklPBCNyYzE9t8svlUhnwXG3+iho0r4nMrJzcNars:COL7rUSbGY89WPh6tK4neJQNGs
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1268 7zFM.exe Token: 35 1268 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 7zFM.exe